Background of the Topic
Evaluating the data security involved with Denial of service attack in cloud computing
Background of the topic
A denial of service attack (DDoS) is accomplished through flooding the target host as well as network with traffic until the specific target is not responding, crashing as well as preventing the resources and services that are accessible. Various methods need to carry out a DDoS attack. In this method, a general method regarding the attack usually occurs when an attacker floods a specific network server with traffic. In this attack, the attacker because of traffic sends requests to the target server as well as overloading. On the other hand, the services are generally fabricated with the requests to the target server. In addition, the junk requests are proceed continuously, whereas the server is overwhelmed.
A denial-of-service attack generally happens when a particular legitimate user is not able accessing the information systems, devices as well as different network resources for the actions included in malicious cyber threat actor. The services have an impact on the process that may consist of email, websites as well as online accounts. On the other hand, the services rely on the affected system or network (Zhang et al. 2015). On the contrary, a distributed denial of service attacks occur when several machines are operating to attack a specific target The attack can allow exponential requests that can be sent to target. Hence, it results in increasing the attack power. In addition, it causes difficulty of attribution, as the true source of attack is more difficult for identification.
Research aims and objectives
The research aims to identify the data security issues lied with DDoS attack in cloud computing. In addition, the research finds out the factors responsible for denial of service attacks occurred in cloud computing as well as finding out the solutions in order to overcome the security issues.
The research has the following objectives.
- To identify the factors responsible for DDoS attacks in cloud computing
- To find out the loop holes that causes DDoS attacks in cloud computing
- To critically evaluate the impact of DDoS attacks in cloud computing
- To recommend solutions for mitigating the DDoS attack in cloud computing
Research questions
The research has the following questions.
- What are the factors responsible for denial of service attack in cloud computing?
- What are the loop holes that causes denial of service attack in cloud computing?
- What is the impact of denial of service attacks in cloud computing?
- What are the solutions for mitigating the denial of service attack in cloud computing?
Research rationale
The field of cyber forensics is getting more attention especially as the security issues are increasing day by day. However, the issues in denial of service attacks are based on political and different motives. Forensic evidence is getting difficult to come by. On the other hand, tracing the origins of the attacks is difficult as the sources is a legitimate third part server that runs on a service that has been leveraged through an attacker as a part of reflection or amplification of the attack (Kustarz et al. 2016). There is a direct flood attack from a single device that runs the service that has been leveraged from a single device or botnet of several devices where IP source can address the process easily spoofed to an individual. It cannot be related to the attacker. This is the major reasons for which it is critical to have the solution of protection that has the ability in not only blocking the every types of attacks, additionally it can identify the type of attack vectors. Moreover, it is required for analyzing the digital fingerprint and collects intelligence in order to prepare the process against the target. Hence, it becomes important to analyze the security issues lied with the DDoS attack in cloud computing.
Research Aims and Objectives
In cloud computing, denial of service attacks is occurred when the attackers attempt to prevent the users to accessing the service. Denial of service attacks can cause several issues like ineffective services, interruption of network traffic, connection of interference and inaccessible services (Merlo et al. 2014). Hence, it is important to focus on the process that can be helpful to gain competitive benefits in the process. The symptoms of the attack resemble the non-malicious issue like technical issues with a particular network and system administrator that can perform maintenance. On the other hand, an unusual network and unavailability regarding a specific website along with inability of accessing any website can be caused for DDoS attacks (Fung et al. 2015). Thus, it becomes important to analyze the security issues involved with denial of service attacks.
Structure of the study
The research includes five chapters. Introduction covers background, research aims and objectives. In addition, research questions as well as rationale of the research are included. Literature-review chapter deals with reviewing the secondary data gathered from books, journals and websites. Third chapter deals with selection of methodological tools for conducting the research in proper way. On the other hand, fourth chapter of the research discusses the data analysis and findings. Last chapter of the study concludes with the conclusion as well as recommendations for specific research.
According to NIST published in 2009, cloud computing is considered as a model for enabling the environment and on-demand access of the network. It is a shared pool regarding configurable resources in the field of computing. On the other hand, pay per use, visualization, flexibility as well as minimized hardware and maintenance as well as on demand access are important for cloud computing. However, DDoS attack becomes a major issue that can reduce performance of cloud services in a significant through damaging the virtual servers. This section of research covers overview of the attack, theories and models related to security as well as impact of denial of service attacks
Denial of service attack has been launched by affecting the victim in the current forms that can be described as followed. In this attack, an attacker finds some issues. There are also some attacks can find the bug or issues in implementation of software in order to disrupt the particular service. On the other hand, some of the attacks deplete bandwidth of the resources of the victim system. In this perspective, the attacker can send specific network findings. It is also important to find the resources and use the agents through attackers. These are known as zombie machines. In addition, zombie machines utilize spoofed IPs. On the other hand, security in internet depends on the hosts. In addition, the attackers negotiate with the use of security hosts in order to launch DDoS attacks as well as spoofed ID address. It makes the process difficult tracing the attack source. In addition, internet provides the attacker a number of options, where vulnerable hosts are selected. In this process, the target of DDoS attacks provides a rise to several conditions that can cause denial of service attacks. On the other hand, the major targets of the attack are the resources such as bandwidth and CPU.
Research Questions
On the other hand, a widely dispersed nodes are known as DDoS attacks. The attacker can launch the attack with the assistance of zombies. The zombies are known as secondary victims. The current attacks consist of attacking website and bitcoin. Furthermore, there are also several anonymous tools are increasing day by day. It includes the lists of DDoS attacks occurred over the years as well as the process of evolving.
System theory:
A system is the collection of entities that acts together for performing a specific purpose. However, a particular system is separated from the environment by a boundary, which can make separation of the system. Considering the entry in the particular system across the boundary can be achieved by delivering inputs of the system. In addition, the crossing boundary can be performed by the inputs from the system. It provides information and contains regular elements that can be designed in order to manage control of the inputs. The distinctive crossing boundary is performed through the system inputs. It also provides information to the environment.
On the other hand, it is based on input of the system. The regulator analysis of the entire system is examining the regulatory portion. There is virtual combination of components. As the system becomes complicated, the number of states that increase the regulator size and requires proper functions. It also requires increasing for covering the potential system states. The component can operate against the specific information inside the boundary of the system. A major to describe the system is providing information inside the system boundary and transition between the states.
In DDoS attack, an attacker attempt flooding a networker minimizes a legitimate bandwidth of the users. It can disrupt the service to a particular system as well as prevent user access to a particular service (Kim et al. 2016). The impact of a flooding attack can be expected to be amplified drastically. On the other hand, there are various types of impact:
Direct denial of service:
When cloud computing is important for the organization so that it would be helpful to gain competitive benefits. It is important to focus on the process. It will begin providing more successful and computational power as virtual machines. Cloud protection system occurs running on the virtual machines as well as service instances coping with extra workload. In addition, cloud protection system tries working against the attacker.
Indirect denial of service:
Research Rationale
If a service occurs running on the same server, it is required to raise the bills for using cloud computing drastically. It can affect the services and make the services effective. Hence, if a service required running the service, it would be helpful to improve the service.
Accounting Cloud computing: Service is continuously charging consumers as per the service as per the actual of the resources where major impact of flooding attack on the cloud computing services (Somani et al. 2017). It can increase to utilize it drastically. The issue is increasing the services. The issue has no upper limit and computational power usage.
In traditional physical environment of the data centers, the DDoS payload has target based on the infrastructure that becomes potential experience of the customers as well as economic hit against the capacity assumptions. In the cloud environments, the pattern is changing day by day. It is important to develop the procedure that can assist to make change in the process (Somani et al. 2017). The in-built protections do not feel burn of poor user experience as the bill of DDoS attacks that hits the shared internet connectivity. On the other hand, when the attack helps to compute domain, the pain generally occurs in the process.
There are general observers stated that currently any successful defenses against the distributed denial of service attacks. However, there are various safety measures hosting and the network can perform the security process. It is difficult finding out the distributed environment. It is also important to develop the process as it helps to improve the process. On the other hand, it is important to ensure that the project would be gain success. In addition, security is considered as a major concern and has an important role since the operations are automated properly as well as large volumes of data are properly maintained in servers. Cloud computing is an evolving technologies that have a huge volume of storage and made on-line properly. It assists making the procedure effective for the organization. For having distributed nature, it becomes having easy targets for specific intruders exploiting information. On the other hand, the well known distributed service attack ha specified in the process. It is also important to develop the process so that it is effective for improving the procedure. In addition, other services are helpful to improve the procedure. Cloud computing is also considered as useful way for improving the way to improve the procedure and allure the business process by adopting cloud computing. Most of the times, it has been used through the internet connectivity and virtualized the procedure. The cloud infrastructure as well as maintained by third party and cloud service provider on own cost. The acceptance of the services through cloud service provider has increased better as comparing the process. Distributed denial service attack can enhance the priorities where websites, portals as well as cloud services with portals as well as cloud services.
Structure of the Study
In addition, it is important to enhance the process where it is important to develop the procedure of enhancing the attack. Distributed denial service attacks are the priorities and make the process enhanced for the cloud services. The organizations can operate or utilize the internet with malware dealing with the internet service (Sattar et al. 2015). The attacks have possibility disturbing internet services and require to be aware and plan for managing the risks of interruption. It is important to improve the procedure with internet services. A DDoS attack can be characterized. Distributed denial service attack is important for the organization. There are several types of attacks where it is important to distinguish the procedure. It becomes difficult for managing denial of service attack.
Internet of things deals with sensors as well as connected devices, which are considered as ubiquitous popping up as well as data generating complicated for use. It occurs for immediate processing the staffs locally and dealing with the concept that can address the number of users to the internet that has crossed the limit. On the other hand, predictive analytics and visualizing data can be provided happening in the cloud (Sattar et al. 2015). The version has the concept of providing the address as the number of users associated with internet can cross the IPV4 limit. It requires enormously and expands with the protocol address that can be helpful. DDoS attack is considered as the impact for consuming the finite resources without requirement and advantages in the design as well as affecting availability of the service.
- Victim: The target of victim generally receives brunt of the attack.
- Attack Daemon Agents (Zombie): In this attack, the agent programs can carry out the attack on the target victim. Moreover, the attackers can gain access as well as conduct the attack on particular victims where daemons affect target of the hosts.
- Attacker/ Attacking hosts: The organizer following every attack using the procedure can be useful using the master that stays processed behind the scenes at the time of attack. In addition, it makes difficult tracing (Sattar et al. 2015). The attacker needs to work hard on the requirements in order to analyze the network topology as well as bottleneck, which is exploited at the time of attack.
The real attacker can send executive command for mastering the programs. On the other hand, the control masters programs. The control master program receives message of the executive as well as propagates command to attacks daemons. On the other hand, it is important to make the process effective. The process of receiving attack control and daemons starts with the attack on victim. It goes down as well as not available in order to provide specific services to the intended user.
There are several methods utilized for denial of service attacks that can be explained as followed.
- Smurf-attack: It is based on the process on exploiting specific standard included in the process. It is important to develop the scenario.
- SYN flood attack: It is a procedure based on the procedure of exploiting the standard TCP. In this perspective, the server is not able processing as incoming connecting queue is overloaded.
- UDP flood attack: It is based on UDP echo as well as character generator service provided with the help of the most systems on a network (Girma et al. 2015). The attacker utilizes the UDP packets for connecting the echo service on a particular on different machine. In addition, it is important to develop the process that can enhance service with a different machine. There is different method such as teardrop attacks, land attack as well as flood attacks. Moreover, the buffer flow attacks are utilized through attacker in order to launch the attack.
The techniques assist an attacker coordinating as well as executing the attack. On the other hand, the techniques are usually listed in the process in chronological order. It can be distributed by the techniques. It becomes more advanced as well as more difficult for identifying. However, it is difficult differentiating between normal traffic as well as DDoS attacks traffic. The attackers can generate similar requests as the legitimate user as well as does not include an effective differentiation mechanism. In addition, there are few distributed defense frameworks giving defense against the DDoS attack.
Literature Review
Filtering the packets that enter as well as leave the network can protect specific network from the attacks that are conducted on the process. In addition, defense frameworks could be helpful in this process. Filtering the packets can enter as well as leave network. It can protect the network from the attacks that are conducted on the process. It is important to assume that the routers using the access control protocol lists in order to filter protect against simple as well as known DDoS attacks. It protects against simple as well as known DDoS attacks like ping attacks through filtering unwanted attacker.
On the other hand, load balancing is utilized for implementing fail over the process and continuation of specific service after failure of components. It is also important to deliver the process and ensure effective method in the not known protocols. It needs installation of the procedure and packet filters on the routers. Distributed denial service attack is utilized as well as ensures the process for implementation. Disabling IP broadcasting helps the process to defend against the attack. It is important for the organization to ensure the procedure with the assistance of cloud systems. Information as well as defending the process can disable the network system. Hence, exchanging the process could plan including the process. The exchanging information regarding the process can be helpful in this process.
The observer stated that presently any successful defenses procedure against the distributed denial of service attack. On the other hand, various safety measures can perform for a specific hosts or the network that performs increasing security of the network as well as neighboring networks. In addition, several advanced networks can improve the process with DDoS attack. It is important to find the process in the distributed environment and the real attacker for using multiple layer of control layer of control master program (Durairaj and Manimaran 2015).
On the other hand, it is difficult distinguishing the type of attacks. The DDoS attacks are surprisingly simple for implementing. For an instance, an attacker sends a massive volume of connection requests in order to overwhelm a specific server. The programs can be properly designed for sending synchronization of the packets to the target.
On the other hand, it will reply different packet that is known as SYN/ACK. The useless connection is unavailable to the legitimate users. Whether adequate malicious SYN packets are properly sent, the available connections can be consumed. It deny any type of legitimate requests for the connections. In this perspective, when an attack originates from a single number of device, the pros of cloud security can block the IP address. On the other hand, the traffic arrives at the cloud network firewall. When the attacks are properly distributed within a botnet results in disruption of the operations. However, identification of the command as well as control device takes proper time. These are detected as well as eliminated in the process. On the other hand, the botnets have been designed for the identifying a failed command as well as promote different member of the botnet (Gupta et al. 2017). It is important to have proper command as well as control server in this process. In addition, there are alternative security techniques that can be applied and utilized in the DDoS attacks like deep packet inspection as well as application of the hardware that is placed on the network in order to analyze the packets. The measures need to be designed in order to scale to the specific level of attack.
Overview of Denial of Service Attack
A snort based can cooperate the process for mitigating the DDoS attacks included in the network. However, the IDS can compare the type of received packets with the block, table as well as whether a match has been found, the packet can be dropped immediately. Exchange of IDS alerts with the IDS as well as utilizes majority vote method in order to decide true as well as false alerts. The IDS includes the elements performing the detection process. The intrusion detection and alert clustering are important. The threshold consumption as well as performing the detection is included in the system.
The cloud Trace is generally utilized identifying the source. It detects unique collaboration patterns among the packets through extracting the attribute pair in IP as well as TCP headers. After that it is able to calculate the value in order to determine trustworthiness of a correlation pattern between attribute pairs. In addition, the higher grade of frequency pair is important at the time of normal packet. CBF score for the packers can be calculated that has a weighted average of the confidence values of the attributes in the process. The merits of CBF method consists of less storage space as well as high computational speed along with efficiency in the process. It has high computational speed as well as efficiency involved in the process.
Virtualization of hardware provides specific features to shrink-expand resources of a virtual machine. On the other hand, the properties can give permission on the allocation of CPUs, main memory as well as storage and network. It is important to remove the allocated resources when these are required. There are several service providers that can use the resource allocation and allows cloud customers in order to decide the work.
On demand, utility model is also leaner process. Pay as you go model can allow a cloud customer in order to utilize the resources without purchasing them. There are several other models where a virtual machine owner has an important role in using the process. The use of cloud examples are charged on hourly basis (Mondal et al. 2017). Resources are allocated on fixed basis through actions and multitenancy is considered as the method of achieving the process. In addition, it helps to improve the process on different users. On the other hand, a typical attack in the scenario is important to process the servers that are capable of running virtual machines in multi-tenant virtualized environments. In denial service attack, the attackers have aim in attacking the economic sustainability aspect of cloud customers. Hence, it is important to understand the procedure that has fraudulent resource contribution attacks. The cloud computing gives adequate scopes as well as advantages to the customers as well as same set of the procedure in denial of service attack. The requests is achieving the use of the denial of service attack with the process of auto scaling. It is important to direct the procedure to quantify the impact of the attacks in cloud (Deshmukh and Devadkar 2015). On the other hand, it is important to focus on the procedure and automated malware driven bots in order to launch the attacks.
Conclusion
It is important for the organization to follow the right process in cloud computing. Scalability can be achieved with the help of spreading an application over several physical servers and ample storage. It is important to maintain scalability driven through high speed in the reconnects and have an important role in developing the process. It is important to consider that the requirement for the procedure would be helpful to consider VM cloning. It is considered as subsequent implementation process. In addition, scalability is supported through migration of virtual machines.
Proper comprehension of the models regarding the impact of DDoS attack on cloud computing, helps to conduct the research in rght way. On the other hand, it is important comprehending the method of collecting data in efficiency way. Research methodology assists in understanding the proper way to conduct the research. Present chapter describes understanding the way to conduct the research in proper way. There are various types of ideas as well as proper research study has been described in the current chapter. It helps to understand and elucidate the research approach and design of the research. However, the process of electing the tools of research has been used in the research. It is important defining the research issue at first. After this process, the design process has been defined in the research.
Positivism philosophy is chosen for the research. In addition, deductive approach as well as descriptive research design has been selected. However, quantitative research approach is used to analyze the primary data gathered from survey. It is important to have ontological frameworks regarding the research process.
(Source: Created by author)
Positivism philosophy ensures that proper legitimacy and appropriateness of the data. The phenomenon requires to be collected, analyzed and used (Mackey and Gass 2015). On the other hand, the concept of knowledge may appear in the process, where it is important to engage creating the process for covering the research questions as well answers.
Justification for selection:
In the research, positivism philosophy is selected by the researcher for analyzing the significance and impact of DDoS attacks on cloud computing. There is an important philosophical differences existing researchers concentrating on the facts as well as analysis of the procedure. In this perspective, selection between positivism and interpretivism philosophies as well as the methods such as quantitative methods selected for the research. The development process of practicing the research includes effective analysis. The statistical analysis can be helpful for the process. However, positivism philosophy is used in the research. The utilization of positivism philosophy ensures accuracy of data. It can improve the process.
A research approach is important to ensure that proper format is required for conducting the research effectively. An appropriate topic is chosen for the study as it has significance as well as research development and conducting the research. Inductive approach as well as deductive approach are considered as the types of research approaches utilized in a research (Taylor et al. 2015). Inductive approach allows the researcher referring the existing theories and concepts of DDoS attacks on the process of cloud computing.
Justification for selection:
The use of deductive approach is helpful to analyze the data properly. It results in finding the data with the existing data. The use of deductive approach has been justified for the research. It is important to refer the existed theories and concepts of process. Inductive approach deals with producing the theories as well as models have been discarded in the research. Thus, analyzing the impact of DDoS attacks on cloud computing.
The research design is important as complete design tends producing significant and proper conclusions (Lewis 2015). In this case, the researcher has utilized descriptive research approach. It is important to improve the process with the strategy of specific methods that could be followed answering the research approach. It is also important to discuss that proper procedure. The research design is important to present a strategy on the specific methods that would allow the researcher to present the strategy in specific way. The research strategy used in a research in collecting the necessary data while analyzing the data for the research.
Justification for selection:
The utilization of descriptive research design is properly justified as the research design of the research allows to identify the problems that are included in the impact of DDoS attack on cloud computing security. It provides several recommendations through analyzing the impact of DDoS attack on cloud computing. However, the strategy permitted that the research has as several factors to be included. Therefore, selection of the research design is properly justified in the research.
There are several research strategies that consists of action research, interview, survey and case study. In the current research, survey is applied (Vaioleti 2016). The application of survey research strategy is proper and allows the researcher allowing the raw data collected for the research. On the other hand, the quantitative data from the employees of the organization has been considered in the project.
There are several research strategies consisting of the survey strategy is proper and allows the researcher to collect the data from the process. The employees are considered as the respondents for the research. (Brinkmann 2014). In the current research, primary data has been collected for the research as it assists in collecting the raw data from the survey. It is also important to analyze the data with proper data analysis technique.
The data collection method assists the researcher gauging the data from the employees of the organization (Smith 2015). It results raw as well as current data in terms of analyzing the process. However, the data will be distributed among primary as well as secondary data collection. The journals as well as articles are referred to the study. Primary data will be properly distributed among the employees of the organization.
The data helps in perception regarding research topic while helping the process of extracting the data according to the demands. It assists in collecting raw material that is catered as per the demands of the research.
Qualitative data assists in recording narrative data form. It helps in describing the data for the research. Quantitative data assists in providing the theoretical aspect, which can lead in better comprehension of the topic. It assists the statistical data, which is helpful recording the large sample data.
Different types of research sampling process as well as technique include non-probability sampling and the procedure used by the researcher. In addition, the researcher has selected simple random probability sampling technique for the research. There are 15 employees selected for giving their opinion in the survey regarding the impact of DDoS attacks on cloud computing security.
The researcher has followed ethical considerations during conduction of the research. It is important to ensure that ethical practice for the research is appropriately followed. A basic criteria is ensuring that the data collection procedure without having any enforcement. Thus, proper signed participation form is significant to ensure ethical practice. After finishing the data collection, it is important to consider the procedure of disclosing and the participants agree on the particular way. It is also important to extract the data where authentic sources are important and comprises the necessary criteria for the research.
While conducting the research, it is important to follow the standard through which the data has been collected. As the research can be conducted properly, where it is important to follow the process in the research. In addition, the use of close-ended questions are used for the close ended questions and secondary resources. Furthermore, answering the questions has restrictions for the respondents in order to share opinions of the respondents and satisfaction for the process.
Validity of the research is associated with the extent of survey that can measure appropriate elements that needs to be measured. It is also referred to the procedure that an effective according to the respondents. In the present research, internal validity can be referred as findings of the research meets with reality and external validity of the research. It results the research findings replicated to other environment.
Table 2: Gantt chart
(Source: Created by author)
In this section of the research, it is important to allow the research tools justified in the research as it allows the researcher analyzing the impact of DDoS attacks on cloud computing. It is justified in the research. It is important to use proper platform for analyzing the research topic. The chapter with reference, it is important to stay with the existing concepts. Appropriate development of research methodology.
Findings and Analysis
The present section deals with the findings as well as analysis, which has been acquired from the collected data from online survey. The sample size for the research has been considered as 15 employees from different IT organizations. Thus, the analysis is required to carry out the feedback from the responses. The data analysis has been carried out for the research using the topic. In addition, the hypothesis that has been set for the research project is required to demonstrate the impact of DDoS attacks on cloud computing.
Hypothesis 1
Null Hypothesis (H0): There is least impact of DDoS attack in cloud computing.
Alternative Hypothesis (H1): There is a high significance of DDoS attack in cloud computing.
Hypothesis 2
Null Hypothesis (H0): The features of DDoS attack do not have significant impact on the in cloud computing.
Alternative Hypothesis (H1): The features of DDoS attack have significant impact on the in cloud computing.
Hypothesis 3
Null Hypothesis (H0): The DDoS attack do not have significant impact on the in cloud computing.
Alternative Hypothesis (H1): The DDoS attack do not have significant impact on the in cloud computing.
The descriptive statistics has presented statistics on the collected data and estimate the effect of DDoS attacks that have significant impact on cloud computing. The statistic showed below displays several types of attacks.
Communication skills |
Leadership skills |
Decision making |
Negotiation skill |
Conflict Management |
Project success rate |
|
Mean |
3.085248095 |
2.780852381 |
3.057619048 |
2.828671429 |
3.30852371 |
3 |
Standard Error |
0.1897195 |
0.180984471 |
0.163514913 |
0.171733179 |
0.173054827 |
0.173525926 |
Median |
3 |
3 |
3 |
3 |
3 |
3 |
Mode |
3 |
2 |
2 |
2 |
3 |
3 |
Standard Deviation |
1.154714475 |
1.162913424 |
1.124153235 |
1.212958201 |
1.114043371 |
1.189383936 |
Sample Variance |
1.346562237 |
1.3756259 |
1.265569803 |
1.258675958 |
1.233321719 |
1.514644146 |
Kurtosis |
-0.798418695 |
-0.998894678 |
-0.851004901 |
-0.893102181 |
-0.942801559 |
-0.551829324 |
Skewness |
0.095427825 |
0.054032308 |
0.010336907 |
0.368638684 |
0.11758546 |
0.273975509 |
Range |
4 |
4 |
4 |
4 |
4 |
4 |
Minimum |
1 |
1 |
1 |
1 |
1 |
1 |
Maximum |
5 |
5 |
5 |
5 |
5 |
5 |
Sum |
130 |
121 |
128 |
123 |
139 |
126 |
Count |
42 |
42 |
42 |
42 |
42 |
42 |
Confidence Level (95.0%) |
0.352950492 |
0.355505554 |
0.350422431 |
0.346722191 |
0.347571975 |
0.370138126 |
Table 3: Regression analysis (1)
Establishing regression model:
As discussed, there are different types of attacks in cloud computing is considered as independent variable. Hence, the regression equation looks like below.
Impact on cloud computing = A + B * DDoS attack + C * types 2 attack + D * type 3 attack + E * type 4 attacks skill + F * type 5 attack + g
Where,
A = Intercept of the model
B = Coefficient of DDoS attack
C = Coefficient of type 2 attack
D = Coefficient of type 3 attack
E = Coefficient of type 4 attack
F = Coefficient of type 5 attack
g = Error term
Regression Statistics |
||||||||
Multiple R |
0.427708907 |
|||||||
R Square |
0.154480731 |
|||||||
Adjusted R Square |
0.069825277 |
|||||||
Standard Error |
1.153257676 |
|||||||
Observations |
41 |
|||||||
ANOVA |
||||||||
df |
SS |
MS |
F |
Significance F |
||||
Regression |
4 |
10.1297824 |
2.03397648 |
1.531743 |
0.207603546 |
|||
Residual |
35 |
47.8701176 |
1.340003267 |
|||||
Total |
42 |
58 |
||||||
Coefficients |
Standard Error |
t Stat |
P-value |
Lower 95% |
Upper 95% |
Lower 95.0% |
Upper 95.0% |
|
Intercept |
1.251656327 |
0.703953259 |
1.828072683 |
0.067382 |
-0.145055229 |
2.712366854 |
-0.158055219 |
2.751367844 |
Communication skills |
0.091268541 |
0.199943251 |
0.455972124 |
0.651149 |
-0.314335159 |
0.496672257 |
-0.314335159 |
0.496672257 |
Leadership skills |
0.084508144 |
0.184295402 |
0.461269022 |
0.627338 |
-0.290388555 |
0.461402832 |
-0.291288514 |
0.361304822 |
Decision making |
0.175478218 |
0.193482171 |
0.92405017 |
0.362651 |
-0.213893717 |
0.557850154 |
-0.212293716 |
0.562850124 |
Negotiation skill |
0.237002816 |
0.205269997 |
1.15002739 |
0.243673 |
-0.188101224 |
0.644106857 |
-0.178401224 |
0.654106547 |
Conflict Management |
-0.011452891 |
0.191869124 |
-0.075783593 |
0.95008 |
-0.45386038 |
0.375802542 |
-0.40486034 |
0.37441552 |
The multiple correlations coefficients has value 0.427708907. The value evaluated in the current study indicates that there is a co-relation between the variables and have positive value. Thus, it has been analyzed that the DDoS attack has an impact on cloud computing. However, the computed statistics is between -1 to + 1 that does not represent any significance associated with the statistical value related to the variable correlation.
On the other hand, the coefficient of determination as the value of R square is 0.154480731 that is 17%. Thus, there are nearly 17% variation is related to the dependent variable value. Hence, it can be analyzed that the independency variable for reaching the feasible point.
The adjusted R square is explanatory power that values nearly 0.0598. In this situation, the statistics has the percentage of R square and like significance test considered as statistics. The final aspect is important and it is the above calculation of the standard error of regression. It is associated to the observing the impact of DDoS attack on cloud computing.
The last aspect in the above calculation is the standard error of the regression has been rated at 1.565. The value proves that the variation has been estimated in the research associated with the observed process. It is reliable with the process that is reliable with the context of DDoS attack.
Analysis of the variance:
The data related to the analysis provides effective steps for providing the total variation. It exists in the procedure that helps the process to be developed in the system. It exists the process and effectively defined with the portions as well as described parts.
The SS regression has variation and outlined through regression line. However, SS residual has the variations based on the variables. On the other hand, as per the calculated value, SS regression is important for the organization. As per the variables as well as robust description, the calculated value of SS regression is 10.152. However, SS residual is computed at 47.857. Thus, total SS ANNOVA is valued at 58.
On the other hand, the P value is properly connected with the estimated value of F static. It is comprehensively beyond of the computed value. For an instance, the comparison is important for the organization. In addition, the compassion is developed through the computed value and based on 5%. Thus, the null hypothesis has been rejected.
Estimated regression line:
The optional regression line embraces the approximated factors as well as standard factors as well standard quantities. Thus, it has been computed to the statistics as well as equivalent evaluation and that is 95% of self-assurance intervals. It is an important part of it. However, the positive link between the relationship of the dependent variables as well as independent variables. However, the attack is negatively linked with cloud computing. The value is 0.0856. It is aligned with the dependent variables. Hence, the total size under the co-efficient is 0.0856. It is linked with the dependent variable.
The hypothesis has been tested for the analysis. The descriptive statistic present the data that has been gathered for determining the process that have an impact on cloud computing. The statistics presented below is important for the features of the DDoS attacks is independent variable, whereas the impact on cloud computing is dependent variable for the analysis from the gathered data.
Descriptive Statistics
Significant for project activities |
More vital than hard skills |
Easier to develop than hard skills |
Required during project execution |
Maintaining activities |
Project success rate |
|
Mean |
3.09248085 |
3.166645667 |
3.095214095 |
3.261654762 |
3.024809524 |
3.024809524 |
Standard Error |
0.156252928 |
0.186445913 |
0.173134115 |
0.186647438 |
0.182475713 |
0.205286093 |
Median |
3 |
3 |
3 |
3 |
3 |
3 |
Mode |
3 |
2 |
2 |
4 |
3 |
2 |
Standard Deviation |
1.0756701344 |
1.244135427 |
1.12205141 |
1.210745279 |
1.214118002 |
1.324131585 |
Sample Variance |
1.161550186 |
1.452549593 |
1.259411161 |
1.466314235 |
1.414224158 |
1.756907085 |
Kurtosis |
-0.387364554 |
-1.079153844 |
-0.990524087 |
-0.978120346 |
-0.789147543 |
-1.204674174 |
Skewness |
0.293774411 |
0.442413067 |
0.348351442 |
-0.187314409 |
0.202476056 |
0.165687491 |
Range |
4 |
3 |
4 |
4 |
4 |
4 |
Minimum |
1 |
1 |
1 |
1 |
1 |
1 |
Maximum |
5 |
5 |
5 |
5 |
5 |
5 |
Sum |
130 |
132 |
130 |
137 |
126 |
137 |
Count |
42 |
41 |
42 |
42 |
43 |
42 |
Confidence Level (95.0%) |
0.33473538 |
0.37145034 |
0.349142083 |
0.371428077 |
0.380128562 |
0.423446691 |
Table 4: Regression analysis (3)
Establishment of the regression model:
As discussion in the above part, there are several features like different types of attacks. The features are important for managing the DDoS attacks on independent variables as well as other variable and activities occurred during attacking in cloud computing process.
Project success rate = A + B * Significant for attacks + C * More vital than other attacks + D * Easier to manage + E * required during processing + F * Maintaining activities + g
Where,
A = Intercept of the model
B = Coefficient of Significant for attack activities
C = Coefficient of the precaution measures
D = Coefficient of security
E = Coefficient of Required during execution
F = Coefficient of Maintaining activities
g = Error term
Regression Statistics |
||||||||
Multiple R |
0.64565895 |
|||||||
R Square |
0.424259387 |
|||||||
Adjusted R Square |
0.344750419 |
|||||||
Standard Error |
1.07994441 |
|||||||
Observations |
42 |
|||||||
ANOVA |
||||||||
df |
SS |
MS |
F |
Significance F |
||||
Regression |
5 |
30.9102435 |
6.11400487 |
5.31435424 |
0.000914506 |
|||
Residual |
36 |
41.9416613 |
1.16628492 |
|||||
Total |
41 |
72.95119048 |
||||||
Coefficients |
Standard Error |
t Stat |
P-value |
Lower 95% |
Upper 95% |
Lower 95.0% |
Upper 95.0% |
|
Intercept |
0.45171744 |
0.62487165 |
0.684911242 |
0.497786172 |
-0.907436837 |
1.832875417 |
-0.907436837 |
1.832824717 |
Significant for project activities |
-0.124440071 |
0.222148094 |
-0.867183249 |
0.391582404 |
-0.625808724 |
0.250928241 |
-0.625808244 |
0.250923541 |
More vital than hard skills |
0.324647672 |
0.172425479 |
1.824304377 |
0.074884698 |
-0.033453027 |
0.66674852 |
-0.033452427 |
0.66672437 |
Easier to develop than hard skills |
0.12238266 |
0.202415479 |
0.556113332 |
0.574829027 |
-0.29797429 |
0.52873241 |
-0.29797245 |
0.52872431 |
Required during project execution |
0.0244543494 |
0.17140353 |
0.139528248 |
0.889810249 |
-0.325205399 |
0.38129547 |
-0.332205249 |
0.381292341 |
Maintaining activities |
0.524651433 |
0.152437498 |
3.75007241 |
0.00062241 |
0.258361283 |
0.866942484 |
0.25836243 |
0.866924284 |
Table 5: Regression analysis (3)
The manifold association co-efficient is valued at 0.65165. The assessed value indicates that the correlation between the variables have the positive value. Hence, the dependent variable has optimistic connection with the independent variables. On the other hand, the measurement falls in between -1 to +1. It can ensure that it does not show any other statistical difference in between variable correlation. The co-efficient value of R square is 0.425. It is 17% of the evaluated value and for the coming to the viable point. In addition, the R square is considered as the measurement of illustrative process. It is valued at 0.345. In this perspective, the interesting point is associated to the statistics. It is not measured by the way of percentage like R square as the test of implication. Hence, it optimizes that the adjusted R square is not clarified.
The final factor is the above scheming of the error of regression. It is valued nearly 1.0955. The value can designate the difference and can usually grounded on the dependent variable. On the other hand, the designed value is calculated at 10.145. On the other hand, SS regression can be figured at 47.232. Thus, the total SS ANNOVA is valued 58.
Conclusion and recommendations
Conclusion
The paper provides detailed survey about DDoS attacks and its impact on cloud computing. It is important to defense the mechanism that are available in the environment of cloud computing. The EDoS attack is considered as a basic form of the DDoS attacks in cloud. The attacks have a significant impact on the process that is helpful to provide advantages. In addition, DDoS attacks have vital characteristics on the process that is required to consider the utility of the models. It is important to introduce the process that could assist in developing better plan for it. The impact as well as characterization through several contributors are important to be processed. In this perspective, it is important to follow the methods and make comprehensive taxonomy of DDoS attacks that have significant characteristics.
Hence, a guideline for developing solution design is important to develop the procedure that will be helpful to prevent the attack.. Characterizing the level of effective parameters assists in developing proper procedure so that the impact of the stack can be obtained at a larger level. Cost as well as attacks can make aware of the source allocation algorithms. It is important to analyze the aspects that are required to focus with the aspects that can be helpful to improve the process.
- Security issues associated with cloud computing is related to cloud adoption decision. The data breaches are important for providing effective security measures and cyber security research-community.
- In DDoS attack, migration of the solution can be found in cloud. It is important to present comprehensive solution that has important impact on the process.
- The attacks have been visible attack that the DDoS attackers having the target server that provides a service to the customers. A different flavor of the attack targets a specific service. In addition, it is important for the organization to have increasing number of DDoS attacks.
- In order to overcome the issue, it is required to focus on the process like anomaly detection, source or spoof trace so that the attack can be prevented. It is also important to make count base filtering and BotCloud Detection that would be helpful to mitigate the challenges.
A research helps in gaining the results of the research topic. It allows the researcher to obtain knowledge regarding the research. It helps to conduct the research in effective way. It is avoidable or non-avoidable in the process. The respondents involved in the process were not involved in any form of pressure. Thus, the issues related to reliability of database might be affected. The cross-sectional nature of the research can lead to several limitations of the research can enhance the research. Moreover, the detailed analysis of the process can be erupted for research limitations and analyzing the impact of denial of service attacks in cloud computing. However, the researcher faced some issues for lack of financial expresses that could enhance quality of the analysis with better statistical tools as well as evaluating authentic articles for the research.
The factors in DDoS attacks in cloud computing do not cover all factors. Thus, future studies need to take place through considering the levels of success in the research. However, as the research is taking perceptions where it I required to recommend that future researchers considering non-hypothetical situations to compare the results of the research. It can be recommended that the factors in future study will cover all the aspects regarding the attack.
References
Brinkmann, S., 2014. Interview. In Encyclopedia of critical psychology (pp. 1008-1010). Springer New York.
Deshmukh, R.V. and Devadkar, K.K., 2015. Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science, 49, pp.202-210.
Durairaj, M. and Manimaran, A., 2015. An Extemporized confidence based filtering technique to mitigate DDoS attack in cloud environment. International Journal of Control Theory and Applications, 8(5), pp.2405-13.
Fung, C.J. and McCormick, B., 2015, November. VGuard: A distributed denial of service attack mitigation method using network function virtualization. In 2015 11th International Conference on Network and Service Management (CNSM)(pp. 64-70). IEEE.
Girma, A., Garuba, M., Li, J. and Liu, C., 2015, April. Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In Information Technology-New Generations (ITNG), 2015 12th International Conference on (pp. 212-217). IEEE.
Gupta, B.B. and Badve, O.P., 2017. Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Computing and Applications, 28(12), pp.3655-3682.
Kim, J.H. and Kim, S.H., Ahnlab Inc, 2016. Method for detecting and preventing a DDoS attack using cloud computing, and server. U.S. Patent 9,386,036.
Kustarz, C., Huston III, L.B., Simpson, J.A., Winquist, J.E., Barnes, O.P. and Jackson, E., Arbor Networks Inc, 2016. System and method for denial of service attack mitigation using cloud services. U.S. Patent 9,432,385.
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), pp.473-475.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.
Merlo, A., Migliardi, M., Gobbo, N., Palmieri, F. and Castiglione, A., 2014. A denial of service attack to UMTS networks using SIM-less devices. IEEE Transactions on Dependable and Secure Computing, 11(3), pp.280-291.
Mondal, H.S., Hasan, M.T., Hossain, M.B., Rahaman, M.E. and Hasan, R., 2017, December. Enhancing secure cloud computing environment by Detecting DDoS attack using fuzzy logic. In Electrical Information and Communication Technology (EICT), 2017 3rd International Conference on (pp. 1-4). IEEE.
Sattar, I., Shahid, M. and Abbas, Y., 2015. A review of techniques to detect and prevent distributed denial of service (DDoS) attack in cloud computing environment. International Journal of Computer Applications, 115(8).
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
Somani, G., Gaur, M.S., Sanghi, D., Conti, M. and Buyya, R., 2017. DDoS attacks in cloud computing. Computer Communications, 107(C), pp.30-48.
Somani, G., Gaur, M.S., Sanghi, D., Conti, M. and Buyya, R., 2017. DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, pp.30-48.
Tan, Z., Jamdagni, A., He, X., Nanda, P. and Liu, R.P., 2014. A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE transactions on parallel and distributed systems, 25(2), pp.447-456.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific research. Waikato Journal of Education, 12(1).
Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, pp.308-319.
Yan, Q., Yu, F.R., Gong, Q. and Li, J., 2016. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.602-622.
Zhang, H., Cheng, P., Shi, L. and Chen, J., 2015. Optimal denial-of-service attack scheduling with energy constraint. IEEE Transactions on Automatic Control, 60(11), pp.3023-3028.